Sciweavers

1477 search results - page 112 / 296
» Token flow control
Sort
View
ICCV
2007
IEEE
15 years 10 months ago
On the Extraction of Curve Skeletons using Gradient Vector Flow
In this paper, we propose a new variational framework for computing continuous curve skeletons from discrete objects that are suitable for structural shape representation. We have...
M. Sabry Hassouna, Aly A. Farag
TCS
2010
15 years 2 months ago
Arrows for secure information flow
This paper presents an embedded security sublanguage for enforcing informationflow policies in the standard Haskell programming language. The sublanguage provides useful informat...
Peng Li, Steve Zdancewic
PAM
2009
Springer
15 years 10 months ago
Uncovering Artifacts of Flow Measurement Tools
This paper analyzes the performance of two implementations of J-Flow, the flow measurement tool deployed on most Juniper routers. Our work relies on both controlled experiments an...
Ítalo Cunha, Fernando Silveira, Ricardo Oli...
CSFW
2007
IEEE
15 years 10 months ago
Dynamic Dependency Monitoring to Secure Information Flow
Although static systems for information flow security are well-studied, few works address run-time information flow monitoring. Run-time information flow control offers distinc...
Paritosh Shroff, Scott F. Smith, Mark Thober
ICMCS
2006
IEEE
119views Multimedia» more  ICMCS 2006»
15 years 9 months ago
Adaptive Multimedia Flow Regulation and Delay Analysis for End-Hosts in P2P Networks
This paper proposes a novel adaptive algorithm based on a new soft-regulator (σ, ρ, λ) for concurrent multimedia flows at end hosts. Our algorithm has the following features: ...
Weijia Jia